By Jesper M. Johansson Published by Microsoft Press (http://oreilly.com/catalog/9780735625044) Get the definitive reference for planning...
Showing results 1 to 20 of 1,440
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Together with the launch of updated custom Android software PrivatOS, the handset maker has revealed a new store dedicated to security and privacy applications.
As part of its FutureScape prediction series for 2015, IDC looked at the impending IoT space from a broad spectrum of angles, including network capacity, security and cloud.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
By Bryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi,...
The National Security Agency has released a new open-source program for data network interoperability.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
VideoCapX video-capture and processing ActiveX control allows software developers to easily add access to USB cam, TV tuner, DV camcorder,...
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
A quantum communication network will first link the 2,000 kilometres from Beijing to Shanghai by 2016, with the country also vowing to build a global network by 2030.
New McAfee research claims that a worrying number of organizations are turning off advanced firewall features in order to avoid slowing down networks.
Telstra is working to bolster its position in Australia’s managed network and security services markets with the acquisition of Queensland’s Bridge Point.
Commonwealth Bank's CIO David Whiteing has warned that there are a number of security risks associated with migrating ATM and Eftpos banking services from Telstra's network to the NBN fibre.
Companies running HP's software-defined networking compliant infrastructure will be able to buy apps to implement network services ranging from security to orchestration.
Businesses need security tools that are integrated, coordinated, and able to communicate with each other across the network to provide unified "context-aware" protection, says Sophos CTO.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
The research firm claims that 75 percent of all mobile applications will fail basic security tests next year -- leaving the enterprise vulnerable.
The South Australian government, Adelaide City Council, and Cisco are launching an Internet of Things innovation hub to encourage startups to develop applications through the AdelaideFree Wi-Fi network.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)